copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
Security Bul...
»
AusCERT Exte...
» ESB-2006.0301 -- [Win][Linux][HP-UX][Solaris][AIX] -...
ESB-2006.0301 -- [Win][Linux][HP-UX][Solaris][AIX] -- Sun Java System Directory Server: Denial of Service May Occur Due to Large Memory Allocation for Specific LDAP Requests
Date:
17 April 2007
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0301 -- [Win][Linux][HP-UX][Solaris][AIX] Sun Java System Directory Server: Denial of Service May Occur Due to Large Memory Allocation for Specific LDAP Requests 17 April 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Sun Java System Directory Server 5.2 Publisher: Sun Microsystems Operating System: AIX HP-UX Linux variants Solaris Windows Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2006-0647 Original Bulletin: http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102294-1 Revision History: April 17 2007: Updated patches are available - 5.2patch5 June 16 2006: Sun updates affected versions April 28 2006: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Sun(sm) Alert Notification * Sun Alert ID: 102294 * Synopsis: Sun Java System Directory Server: Denial of Service May Occur Due to Large Memory Allocation for Specific LDAP Requests * Category: Security * Product: Sun Java System Directory Server 5.2 * BugIDs: 6384310 * Avoidance: Patch * State: Resolved * Date Released: 26-Apr-2006, 19-May-2006 * Date Closed: 19-May-2006 * Date Modified: 19-May-2006, 13-Apr-2007 1. Impact A local or remote unprivileged user may be able to prevent an LDAP server from responding to LDAP client requests. This is a Denial of Service (DoS) as LDAP clients referencing the LDAP server may experience hangs or slow performance. Users may no longer be able to login on affected LDAP client systems. This issue is also described in CVE-2006-0647 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0647 2. Contributing Factors This issue can occur in the following releases for all platforms (Solaris 8, 9, and 10 on Solaris SPARC and Solaris x86 Platforms, Linux, Windows, HP-UX, and AIX): Native Package Versions: * Sun ONE Directory Server 5.2 * Sun Java System Directory Server 5 2003Q4 (5.2patch1) * Sun Java System Directory Server 5 2004Q2 (5.2patch2) * Sun Java System Directory Server 5 2005Q1 (5.2patch3) * Sun Java System Directory Server 5 2005Q4 (5.2patch4) without patch 122476-01 PatchZIP (Compressed Archive) versions: * Sun One Directory Server 5.2 * Sun Java System Directory Server 5.2 Patch2 * Sun Java System Directory Server 5.2 Patch3 * Sun Java System Directory Server 5.2 Patch4 without patch 122476-01 Note: Sun ONE Directory Server 5.1 and earlier versions are not affected by this issue. To determine the version of Directory Server running on a system, the following command can be used: $ cd
/bin/slapd/server[/64] $ ./ns-slapd -V -D
3. Symptoms Should the described issue occur, the LDAP server will no longer respond to client LDAP requests. The LDAP server process, ns-slapd, may not be running on the LDAP server. If the LDAP server process is no longer running, there may a message similar to the following about failing to calloc a random number of bytes in the error log: ERROR<5135> - Resource Limit - conn=-1 op=-1 msgId=-1 - Memory allocation error calloc of 8248 bytes failed; errno 11 4. Relief/Workaround There is no Workaround for this issue. To recover from an unresponsive LDAP server instance, the following command can be used to restart the LDAP server process: On UNIX systems (usually as root user): #
/start-slapd On Windows systems, open the "Services" panel and start the service manually. 5. Resolution This issue is addressed in the following releases for all platforms (Solaris 8, 9, and 10 on Solaris SPARC and Solaris x86 Platforms, Linux, Windows, HP-UX, and AIX): * Sun Java System Directory Server 5 2005Q4 (Native Package) with patch 122476-01 or later * Sun Java System Directory Server 5.2 Patch4 (Compressed Archive) with patch 122476-01 or later Note: Versions previous to Sun Java System Directory Server 5 2005Q4 or Sun Java System Directory Server 5.2 Patch4 must be upgraded to these versions before applying the patch. This issue can also be addressed by upgrading to Directory Server 5.2patch5 by applying the following patches: For the Native Package Versions: * Solaris Sparc: 115614-27 * Solaris x86: 115615-27 * Linux: 118080-12 * HP-UX : 121393-02 * Windows : 121392-03 For the PatchZIP (Compressed Archive) versions: * Solaris Sparc: 117665-04 * Solaris x86: 117666-04 * Linux: 117668-04 * Windows: 117667-04 * HP-UX: 117669-04 * AIX: 117670-04 Change History 19-May-2006: * Updated Contributing Factors and Resolution sections 13-Apr-2007: * Updated Resolution section This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRiRqtSh9+71yA2DNAQLJRQP9FPE5A96q/WOzAKfSHLMEsyTF0cbMigKw RfliQZmES4/hHcxeAmynqrV+wNs9JlWEGqfhANLujYNjUk6iKvCeVHJok8wURrRR 6IZcog9GXN+xUAlcB4ssellhdZpe4+Y7bOoisYghRZXJKcLBS3AxFX0pQtY9UGc/ 5/JjOba6Jdo= =xQU9 -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1980&it=6244